US8259934B2 - Methods and devices for a chained encryption mode - Google Patents

Methods and devices for a chained encryption mode Download PDF

Info

Publication number
US8259934B2
US8259934B2 US12/592,696 US59269609A US8259934B2 US 8259934 B2 US8259934 B2 US 8259934B2 US 59269609 A US59269609 A US 59269609A US 8259934 B2 US8259934 B2 US 8259934B2
Authority
US
United States
Prior art keywords
block
key
plaintext block
encryption
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/592,696
Other versions
US20100150344A1 (en
Inventor
Mohamed Karroumi
Stéphane Onno
Antoine Monsifrot
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Assigned to THOMSON LICENSING reassignment THOMSON LICENSING ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ONNO, STEPHANE, KARROUMI, MOHAMED, MONSIFROT, ANTOINE
Publication of US20100150344A1 publication Critical patent/US20100150344A1/en
Application granted granted Critical
Publication of US8259934B2 publication Critical patent/US8259934B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Definitions

  • the present invention relates generally to encryption, and in particular to chained encryption of data in blocks.
  • FIG. 1 shows how a first data block “Plaintext block 1 ” is XOR-ed with an initialization vector IV, and how the output is encrypted using the Advanced Encryption Standard (AES) algorithm and a key to produce a first encrypted data block “Cipherblock 1 ”. It is this first encrypted data block that is XOR-ed with the next data block “Plaintext block 2 ” during the encryption of this next data block. The process is repeated until the last data block has been encrypted. Decryption is performed the other way, i.e. the first encrypted data block is decrypted using AES and the key, and the output is XOR-ed with the IV to obtain the first data block.
  • AES Advanced Encryption Standard
  • WO 2007/118829 also describes Plaintext Block Chaining (PCB), in which the key used for encryption instead is generated from the previous plaintext block and an encryption key that is identical for all the whole encryption.
  • PCB Plaintext Block Chaining
  • PCBC Propagating Cipher Block Chaining Mode
  • PCBC may be said to be CBC where each plaintext block to be encrypted is first XOR-ed with the previous plaintext block.
  • plaintext block 2 is first XOR-ed with plaintext block 1 and the output is then processed as in CBC, i.e. it is XOR-ed with the previous ciphertext block “ciphertext block 1 ”, which is encrypted to generate ciphertext block 2 that is used in an XOR operation for the next plaintext block.
  • the first plaintext block is, in essence, XOR-ed with an empty block, as there is no previous plaintext block.
  • MPCBC Modified PCBC
  • FIG. 3 The mode modifies PCBC by changing the location of the XOR with the previous plaintext block from before the encryption to after the encryption.
  • a plaintext block “Plaintext Block 2 ” is XOR-ed with the previous ciphertext block “Ciphertext Block 1 ” to provide input for the encryption, and the encrypted output is then XOR-ed with the previous plaintext block “Plaintext Block 1 ” so as to give the ciphertext “Ciphertext Block 2 ”.
  • the invention is directed to a method of generating a key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks.
  • a device retrieves the present plaintext block and generates a second encryption key for the present plaintext block by combining a previous plaintext block with a first encryption key.
  • the first encryption key is an initialization encryption key.
  • the first encryption key is the encryption key that was used for encryption of the previous plaintext block, the previous plaintext block being the plaintext block that immediately precedes the present plaintext block in the ordered series.
  • the invention is directed to a method of encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks.
  • An encryption device obtains an encryption key using the method the first aspect of the invention and encrypts the present plaintext block using an encryption algorithm with the generated encryption key.
  • the invention is directed to a method of generating a key for decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks.
  • a decryption device retrieves the present ciphertext block and generates a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first decryption key.
  • the first decryption key is a decryption key that was used to obtain the previous plaintext block, the previous plaintext block corresponding to the ciphertext block that immediately precedes the present ciphertext block in the ordered series.
  • the second decryption key generation step a one-way function is applied to the previously obtained plaintext block before the combination.
  • the decryption key that was used for decryption of the previous plaintext block is a subkey of a plurality of subkeys resulting from a key schedule algorithm or a subkey of a plurality of subkeys used for decryption of the previous plaintext block.
  • the invention is directed to a method of decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks.
  • a decryption device obtains a decryption key using the method of the third aspect and decrypts the present ciphertext block using a decryption algorithm with the generated decryption key.
  • the invention is directed to a device for generating an encryption key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks.
  • the device comprises a communication unit adapted to retrieve the present plaintext block and a processor adapted to generate a second encryption key for the present plaintext block by combining a previous plaintext block with a first encryption key.
  • the invention is directed to a device for generating a decryption key for decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks.
  • the device comprises a communication unit adapted to retrieve the present ciphertext block and a processor adapted to generate a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first decryption key.
  • a plurality of subkeys are used to decrypt a ciphertext block and the processor is adapted to find which at least one subkey from the plurality of subkeys to combine with the previous plaintext block.
  • FIG. 1 already described, illustrates the prior art Cipher Block Chaining (CBC) mode
  • FIG. 2 already described, illustrates the prior art Propagating Cipher Block Chaining (PCBC) mode
  • FIG. 3 already described, illustrates the prior art Modified Propagating Cipher Block Chaining (MPCBC) mode
  • FIG. 4 illustrates a chaining mode according to a first preferred embodiment of the present invention
  • FIG. 5 illustrates a chaining mode according to a second preferred embodiment of the present invention
  • FIG. 6 illustrates a chaining mode according to a variant embodiment of the present invention
  • FIG. 7 illustrates a key schedule algorithm
  • FIG. 8 illustrates a further variant embodiment of the method according to the invention.
  • FIG. 9 illustrates a method of encryption of a plaintext block according to a preferred embodiment of the chaining mode of the present invention.
  • FIG. 10 illustrates a method of decryption of a plaintext block according to a preferred embodiment of the chaining mode of the present invention.
  • FIG. 11 illustrates devices for encryption and decryption using the chaining mode according to a preferred embodiment of the present invention.
  • the present invention is directed to a method of generating encryption keys for encrypting a present plaintext block of digital data that belongs to an ordered series of at least two plaintext blocks.
  • the present plaintext block is retrieved and a second encryption key for the present plaintext block is generated by combining a previous plaintext block with a first encryption key.
  • the present invention comes in at least two variants: an iterative variant and a non-iterative variant.
  • the first encryption key is an encryption key that was used to encrypt the previous plaintext block, the previous plaintext block being the plaintext block that immediately precedes the present plaintext block in the ordered series.
  • the first encryption key is an initialization encryption key, which remains constant for the generation of encryption keys for at least two plaintext blocks. At the decryption side, these variants also apply for the generation of decryption keys.
  • FIG. 4 illustrates a chaining mode according to a first preferred embodiment of the present invention, “the non-iterative variant”.
  • the upper half of the figure illustrates encryption and the lower half of the figure illustrates decryption.
  • the first plaintext block “Plaintext Block 1 ”, has to be treated in a special manner, as there is no preceding plaintext block.
  • the method in FIG. 4 uses a preferably random initialization key K and a preferably random initialization vector IV that are already known.
  • the IV can be sent in non-protected form while the key has to be securely transmitted to a receiver of the encrypted content.
  • key K may for example be transmitted to the receiver encrypted with a receiver's device key.
  • This encryption step may be performed using public key cryptography or symmetric key cryptography. If it is done with symmetric key, then this invention may also be used for encryption of the initialization key K.
  • Plaintext block 1 is encrypted using an encryption key that results from the initialization key K XORed with a random IV, so as to generate ciphertext block 1 .
  • Each subsequent plaintext block is encrypted using a new encryption key that is obtained by XOR-ing the previous plaintext block and the initialization key K.
  • the obtained ciphertext blocks may be transmitted one by one as soon as they are encrypted, but it is also possible to group two or more (up to all) ciphertext blocks for transmission.
  • Ciphertext block 1 is decrypted using a decryption key that results from the XOR between initialization key K and the IV, so as to generate plaintext block 1 .
  • Each subsequent ciphertext block is decrypted using a new decryption key that is obtained by XOR-ing the previous generated plaintext block and the initialization key K.
  • the encryption process can be done in any order in this first preferred embodiment, as the encryption key depends on at least the previous plaintext block and one basic key, such as an initialization key. It could be done for example in reverse order i.e. encrypting first ciphertext block N, then ciphertext block N-1, . . . , ciphertext block 1 . This does not affect the order at the decryption time, which remains ciphertext block 1 , then ciphertext block 2 , . . . , ciphertext block N. This is possible as it is the plaintext block that is used to modify the encryption key.
  • FIG. 5 illustrates a chaining mode according to a second preferred embodiment of the present invention, “the iterative variant”.
  • the upper half of the figure illustrates encryption and the lower half of the figure illustrates decryption.
  • the first plaintext block “Plaintext Block 1 ”, has to be treated in a special manner, as there is no preceding plaintext block.
  • the method in FIGS. 5 and 6 uses a preferably random initialization key K and a preferably random initialization vector IV that are already known.
  • the IV can be sent in non-protected form while the key has to be securely transmitted to a receiver of the encrypted content.
  • key K may for example be transmitted to the receiver encrypted with a receiver's device key.
  • This encryption step may be performed using public key cryptography or symmetric key cryptography. If it is done with symmetric key, then this invention may also be used for encryption of the initialization key K.
  • Plaintext block 1 is encrypted using an encryption key that results from the initialization key K XORed with a random IV, so as to generate ciphertext block 1 .
  • Each subsequent plaintext block is encrypted using a new encryption key that is obtained by XOR-ing the previous plaintext block and the key used to encrypt the previous plaintext block.
  • the obtained ciphertext blocks may be transmitted one by one as soon as they are encrypted, but it is also possible to group two or more (up to all) ciphertext blocks for transmission.
  • Ciphertext block 1 is decrypted using a decryption key that results from the XOR between initialization key K and the IV, so as to generate plaintext block 1 .
  • Each subsequent ciphertext block is decrypted using a new decryption key that is obtained by XOR-ing the previous generated plaintext block and the key used to decrypt the previous ciphertext block.
  • any block cipher algorithm can be used for encryption and decryption; the preferred algorithm is AES.
  • Another example is to use another function than XOR to combine the key and the plaintext block, such as addition modulo 2 x , where x is the bit length of the key K. It is also possible to modify the plaintext block, for example by application of a one-way function, before it is combined with the key.
  • the present invention can be combined with any other block chaining mode operation like CBC. If combined with CBC mode, the present invention provides an interesting alternative to Modified Propagating Cipher Block Chaining Mode (MPCBC).
  • MPCBC Modified Propagating Cipher Block Chaining Mode
  • FIG. 6 An added feature compared to FIG. 5 is that a plaintext block is combined (by XOR) with the previous ciphertext block before encryption.
  • Encryption of data is generally done in “rounds” within block cipher algorithms. Each round uses a round key or a subkey to process the data. The setup of each round is the same, except for the subkey that is changed, i.e. the data is iteratively encrypted in each round. Therefore, most of the block ciphers include a key schedule algorithm that calculates the subkeys from a master key K. More precisely, a key schedule algorithm processes the key K and a direction (“encrypt” or “decrypt”) and produces a sequence of R subkeys EK 0 , EK 1 , . . . , EK R ⁇ 1 , if the direction is encrypt or DK 0 , DK 1 , . . .
  • DK R ⁇ 1 if the direction is decrypt. Encryption is performed through the R round as depicted in FIG. 7 .
  • Some block ciphers like Tiny Encryption Algorithm (TEA) have simple key schedules where a 128-bit master key K is split into four 32-bit round keys and used repeatedly in successive rounds.
  • Other block ciphers use more complicated key schedules; this is the case for AES, which expands a key K into several rounds keys that has same length as master key K.
  • TAA Tiny Encryption Algorithm
  • the key schedule algorithm When encrypting several blocks with the same key K, the key schedule algorithm is generally called once at the beginning, before encryption of the first plaintext block. Encryption of successive plaintext blocks is done using previously computed subkeys. This is how it is done in prior art methods like CBC or PCBC. In this invention, given that the key changes for the encryption of each block, the key schedule algorithm has to be executed several times; as many as the total number of plaintext blocks. This introduces a delay on the performance and slows down encryption/decryption speed, something that may be unwanted.
  • FIG. 8 illustrates the variant embodiment of the method according to the invention using AES.
  • the 128-bit version of AES expands a 128-bit key K into ten 128-bit subkeys EK 0 , EK 1 , EK 9 through the key schedule algorithm when the direction is encrypt.
  • Plaintext block 1 is iteratively encrypted using 10 subkeys, were the first subkey results from a XOR between EK 0 and the IV and all other subkeys EK i where i ⁇ 0 remain identical to the subkeys originally generated by the key schedule.
  • FIG. 8 shows how the initial subkeys EK 0 to EK 9 are modified for each plaintext block; only EK 0 is modified for plaintext block 1 , and only EK 1 is further modified for plaintext block 2 and so on.
  • Ciphertext block 1 is iteratively decrypted using the 10 subkeys, where the first subkey results from a XOR between DK 0 and the IV and all other subkeys DK i with i ⁇ 0 are identical to subkeys generated by the key schedule to generate plaintext block 1 .
  • the decryption device Given that the decryption process can only be done in a predefined order (first ciphertext block 1 then ciphertext block 2 , etc), the decryption device is able to know which subkey it should combine with the previous plaintext block for the decryption of a given ciphertext block.
  • a counter/variable may be used to point to the right subkey after each block decryption operation.
  • Modifying only one subkey by XOR-ing it with previous plaintext at each block encryption enables having no more operations than classical chaining modes (there is only one XOR operation added at each block encryption). It will thus be appreciated that this variant embodiment is as efficient as prior art chaining modes.
  • the encryption/decryption subkeys are generated by XOR-ing all previous subkeys used to encrypt/decrypt the previous ciphertext block with previous plaintext block N-1.
  • the encryption/decryption subkeys are all XOR-ed with the initialization vector IV.
  • the encryption/decryption subkeys are generated by XOR-ing always the same subkey, say EK 0 /DK 0 , with previous plaintext block N-1 and for the first block EK 0 /DK 0 is XOR-ed with the IV.
  • the encryption/decryption subkeys are generated, using any combination of at least two previous subkeys (EK i , EK j )/(DK i , DK j ) (used to encrypt/decrypt the previous ciphertext block) together with previous plaintext block.
  • the combination operation may use, but is not restricted to, any one-way function.
  • Tiny Encryption Algorithm TEA
  • Tiny Encryption Algorithm TEA
  • the second property ensures that for example subkey EK i and subkey EK i ⁇ 1 or subkey EK i+1 do not have a lot of bit information in common. As some attacks make use of the relations between subkeys, these would have a higher complexity if these relations did not exist.
  • the key schedule output would not depend only the key K but also on the plaintext to encrypt. This makes a key schedule more difficult to invert if the plaintext is not known. This is what is expected by Property 1. In other words, mixing a vulnerable key schedule output with some plaintext blocks makes the key schedule less vulnerable.
  • FIG. 9 further illustrates the general encryption method according to a preferred embodiment of the invention.
  • a single plaintext block is encrypted, but it will be appreciated that it is possible to generalise the method by iteration.
  • plaintext block N is retrieved 910 and encryption key N is generated 920 using plaintext block N-1 and encryption key N-1.
  • plaintext block N-1 and encryption key N-1 are combined using XOR. It will be appreciated that step 910 may just as well occur after step 920 .
  • plaintext block N is encrypted 930 using an encryption algorithm and encryption key N, which obtains 940 ciphertext block N that may then be transmitted or stored. As mentioned, the method may then be iterated with N increased by one.
  • FIG. 10 further illustrates the decryption method according to a preferred embodiment of the invention.
  • a single ciphertext block is decrypted, but it will be appreciated that it is possible to generalise the method by iteration.
  • ciphertext block N is retrieved 1010 and decryption key N is generated 1020 using plaintext block N-1 and decryption key N-1.
  • plaintext block N-1 and decryption key N-1 are combined using XOR. It will be appreciated that step 1010 may just as well occur after step 1020 .
  • ciphertext block N is decrypted 1030 using a decryption algorithm and decryption key N, which obtains 1040 plaintext block N. As mentioned, the method may then be iterated with N increased by one.
  • the first block is decrypted using an initialization key that may be previously known by the decryption unit or received thereby before decryption begins.
  • FIG. 11 illustrates an encryption system according to a preferred embodiment of the invention.
  • the encryption system 1100 comprises an encryption device 1110 and a decryption device 1120 .
  • the encryption device 1110 is adapted to receive plaintext, encrypt the received plaintext, and output the obtained ciphertext.
  • the decryption device 1120 is adapted to receive ciphertext, decrypt the received ciphertext, and output the obtained plaintext.
  • the encryption device 1110 comprises at least one communication unit “I/O” 1116 adapted to receive plaintext and output ciphertext, and preferably at least one memory 1114 advantageously adapted to store plaintext, intermediary results, ciphertext and at least one encryption key.
  • Device 1110 further comprises a protected area 1118 adapted to store one or several device secret keys. Device secret keys are used to encrypt the initialization key K before transmission. The choice of the device keys to be used by encryption device 1110 depends on the receiver of the encrypted data.
  • the protected area 1118 is preferably resistant against software altering and physical tampering. The protected area 1118 is not necessary if initialization key K is encrypted using asymmetric cryptography, as encryption device 1110 will use public keys for the encryption.
  • the encryption device 1110 comprises a processor 1112 adapted to perform encryption of plaintext according to any of the embodiments of the method described herein.
  • the decryption device 1120 comprises at least one communication unit “I/O” 1126 adapted to receive ciphertext and output plaintext, and preferably at least one memory 1124 advantageously adapted to store plaintext, intermediary results, ciphertext and at least one decryption key.
  • Device 1120 further comprises a protected area 1128 adapted to store a device secret key.
  • the device secret key was previously used by encryption device 1110 to encrypt the initialization key K before being transmitted to the decryption device 1120 .
  • the protected area 1128 is preferably resistant against software altering and physical tampering.
  • decryption device 1120 It is preferable to use the protected area 1128 , because even if initialization key K is encrypted using asymmetric cryptography, decryption device 1120 will use a private key for the decryption of K and this private key needs to be protected and stored in a secure area. Further, the decryption device 1120 comprises a processor 1122 adapted to perform decryption of plaintext according to any of the embodiments of the method described herein.
  • data storage mediums 1130 , 1140 respectively storing thereon computer readable instructions that, when executed in a processor, perform the encryption method or decryption method according to any of the embodiments of the method described herein.
  • the present invention provides a more secure alternative to Modified Plain & Cipher Block Chaining Mode (MPCBC) while, at least in a variant embodiment, being as efficient.
  • MPCBC Modified Plain & Cipher Block Chaining Mode

Abstract

An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N-1 and plaintext block N-1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaitnext block is generated by XOR-ing a random Initialization vector and a random intialization key K. In a preferred embodiment, initialization key K is subkeys resulting form a key schedule algorithm and encryption key N-1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting form a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device.

Description

This application claims the benefit, under 35 U.S.C. §119 of EP Patent Application 08305947.7, filed Dec 15, 2008.
FIELD OF THE INVENTION
The present invention relates generally to encryption, and in particular to chained encryption of data in blocks.
BACKGROUND OF THE INVENTION
This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
There are many conventional encryption modes for encrypting and protecting digital data such as text, audio, and video. Most of these modes divide the data to encrypt into blocks and include a chaining step. Examples of such modes are Cipher Block Chaining (CBC), Cipher FeedBack Mode (CFB), and Output FeedBack Mode (OFB). A common feature of these modes is that the chaining step is based on the previous encrypted data block. A description of these modes may for instance be found in “Applied Cryptography Second Edition”, by Bruce Schneier, 1996, John Wiley & Sons, Inc. USA
For example, CBC, is also described in WO 2007/118829 and illustrated in FIG. 1, uses the previous encrypted data block to encrypt the current data block. FIG. 1 shows how a first data block “Plaintext block 1” is XOR-ed with an initialization vector IV, and how the output is encrypted using the Advanced Encryption Standard (AES) algorithm and a key to produce a first encrypted data block “Cipherblock 1”. It is this first encrypted data block that is XOR-ed with the next data block “Plaintext block 2” during the encryption of this next data block. The process is repeated until the last data block has been encrypted. Decryption is performed the other way, i.e. the first encrypted data block is decrypted using AES and the key, and the output is XOR-ed with the IV to obtain the first data block.
WO 2007/118829 also describes Plaintext Block Chaining (PCB), in which the key used for encryption instead is generated from the previous plaintext block and an encryption key that is identical for all the whole encryption. This prior art document also describes alternating CBC and PCB for encryption of plaintext blocks.
While any change in the CBC plaintext propagates indefinitely, changes in the ciphertext do not. In order to overcome this drawback, the Propagating Cipher Block Chaining Mode (PCBC) was developed. PCBC is illustrated in FIG. 2.
PCBC may be said to be CBC where each plaintext block to be encrypted is first XOR-ed with the previous plaintext block. As can be seen, plaintext block 2 is first XOR-ed with plaintext block 1 and the output is then processed as in CBC, i.e. it is XOR-ed with the previous ciphertext block “ciphertext block 1”, which is encrypted to generate ciphertext block 2 that is used in an XOR operation for the next plaintext block. The first plaintext block is, in essence, XOR-ed with an empty block, as there is no previous plaintext block.
It has however been discovered that swapping blocks does not affect plaintext blocks beyond the swapped blocks, which means that the changes are not propagated infinitely.
To overcome this drawback, a mode called Modified PCBC (MPCBC) has been proposed. MPCBC is illustrated in FIG. 3. The mode modifies PCBC by changing the location of the XOR with the previous plaintext block from before the encryption to after the encryption. As can be seen, a plaintext block “Plaintext Block 2” is XOR-ed with the previous ciphertext block “Ciphertext Block 1” to provide input for the encryption, and the encrypted output is then XOR-ed with the previous plaintext block “Plaintext Block 1” so as to give the ciphertext “Ciphertext Block 2”.
While it would appear that MPCBC works well, the skilled person will appreciate that cryptographic protocols are sensitive, in the sense that a protocol that is believed to be safe may actually comprise an unexpected security breach.
It will therefore be appreciated that there is a need for an encryption mode that provides an alternative to the solutions of the drawbacks of the prior art. This invention provides such an alternative.
SUMMARY OF THE INVENTION
In a first aspect, the invention is directed to a method of generating a key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks. A device retrieves the present plaintext block and generates a second encryption key for the present plaintext block by combining a previous plaintext block with a first encryption key.
In a first preferred embodiment, the first encryption key is an initialization encryption key.
In a second preferred embodiment, the first encryption key is the encryption key that was used for encryption of the previous plaintext block, the previous plaintext block being the plaintext block that immediately precedes the present plaintext block in the ordered series.
In a second aspect, the invention is directed to a method of encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks. An encryption device obtains an encryption key using the method the first aspect of the invention and encrypts the present plaintext block using an encryption algorithm with the generated encryption key.
In a third aspect, the invention is directed to a method of generating a key for decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks. A decryption device retrieves the present ciphertext block and generates a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first decryption key.
In a first preferred embodiment, the first decryption key is a decryption key that was used to obtain the previous plaintext block, the previous plaintext block corresponding to the ciphertext block that immediately precedes the present ciphertext block in the ordered series.
In a second preferred embodiment, the second decryption key generation step, a one-way function is applied to the previously obtained plaintext block before the combination.
In a third preferred embodiment, the decryption key that was used for decryption of the previous plaintext block is a subkey of a plurality of subkeys resulting from a key schedule algorithm or a subkey of a plurality of subkeys used for decryption of the previous plaintext block.
In a fourth aspect, the invention is directed to a method of decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks. A decryption device obtains a decryption key using the method of the third aspect and decrypts the present ciphertext block using a decryption algorithm with the generated decryption key.
In a fifth aspect, the invention is directed to a device for generating an encryption key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of at least two plaintext blocks. The device comprises a communication unit adapted to retrieve the present plaintext block and a processor adapted to generate a second encryption key for the present plaintext block by combining a previous plaintext block with a first encryption key.
In a sixth aspect, the invention is directed to a device for generating a decryption key for decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of at least two ciphertext blocks. The device comprises a communication unit adapted to retrieve the present ciphertext block and a processor adapted to generate a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first decryption key.
In a preferred embodiment, a plurality of subkeys are used to decrypt a ciphertext block and the processor is adapted to find which at least one subkey from the plurality of subkeys to combine with the previous plaintext block.
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred features of the present invention will now be described, by way of non-limiting example, with reference to the accompanying drawings, in which:
FIG. 1, already described, illustrates the prior art Cipher Block Chaining (CBC) mode;
FIG. 2, already described, illustrates the prior art Propagating Cipher Block Chaining (PCBC) mode;
FIG. 3, already described, illustrates the prior art Modified Propagating Cipher Block Chaining (MPCBC) mode;
FIG. 4 illustrates a chaining mode according to a first preferred embodiment of the present invention;
FIG. 5 illustrates a chaining mode according to a second preferred embodiment of the present invention;
FIG. 6 illustrates a chaining mode according to a variant embodiment of the present invention;
FIG. 7 illustrates a key schedule algorithm;
FIG. 8 illustrates a further variant embodiment of the method according to the invention;
FIG. 9 illustrates a method of encryption of a plaintext block according to a preferred embodiment of the chaining mode of the present invention;
FIG. 10 illustrates a method of decryption of a plaintext block according to a preferred embodiment of the chaining mode of the present invention; and
FIG. 11 illustrates devices for encryption and decryption using the chaining mode according to a preferred embodiment of the present invention.
PREFERRED EMBODIMENT OF THE INVENTION
The present invention is directed to a method of generating encryption keys for encrypting a present plaintext block of digital data that belongs to an ordered series of at least two plaintext blocks. The present plaintext block is retrieved and a second encryption key for the present plaintext block is generated by combining a previous plaintext block with a first encryption key.
The present invention comes in at least two variants: an iterative variant and a non-iterative variant. In the iterative variant, the first encryption key is an encryption key that was used to encrypt the previous plaintext block, the previous plaintext block being the plaintext block that immediately precedes the present plaintext block in the ordered series. In the non-iterative, the first encryption key is an initialization encryption key, which remains constant for the generation of encryption keys for at least two plaintext blocks. At the decryption side, these variants also apply for the generation of decryption keys.
FIG. 4 illustrates a chaining mode according to a first preferred embodiment of the present invention, “the non-iterative variant”. The upper half of the figure illustrates encryption and the lower half of the figure illustrates decryption.
The first plaintext block, “Plaintext Block 1”, has to be treated in a special manner, as there is no preceding plaintext block. To this end, just as in the prior art, the method in FIG. 4 uses a preferably random initialization key K and a preferably random initialization vector IV that are already known. The IV can be sent in non-protected form while the key has to be securely transmitted to a receiver of the encrypted content. The person skilled in the art will appreciate that key K may for example be transmitted to the receiver encrypted with a receiver's device key. This encryption step may be performed using public key cryptography or symmetric key cryptography. If it is done with symmetric key, then this invention may also be used for encryption of the initialization key K.
Plaintext block 1 is encrypted using an encryption key that results from the initialization key K XORed with a random IV, so as to generate ciphertext block 1. Each subsequent plaintext block is encrypted using a new encryption key that is obtained by XOR-ing the previous plaintext block and the initialization key K. The obtained ciphertext blocks may be transmitted one by one as soon as they are encrypted, but it is also possible to group two or more (up to all) ciphertext blocks for transmission.
Ciphertext block 1 is decrypted using a decryption key that results from the XOR between initialization key K and the IV, so as to generate plaintext block 1. Each subsequent ciphertext block is decrypted using a new decryption key that is obtained by XOR-ing the previous generated plaintext block and the initialization key K.
The skilled person will appreciate that the encryption key and the decryption key are advantageously identical.
It can be noted that while the decryption process can only be done in an order defined at the encryption time, for instance ciphertext block 1, then ciphertext block 2, . . . , ciphertext block N, the encryption process can be done in any order in this first preferred embodiment, as the encryption key depends on at least the previous plaintext block and one basic key, such as an initialization key. It could be done for example in reverse order i.e. encrypting first ciphertext block N, then ciphertext block N-1, . . . , ciphertext block 1. This does not affect the order at the decryption time, which remains ciphertext block 1, then ciphertext block 2, . . . , ciphertext block N. This is possible as it is the plaintext block that is used to modify the encryption key.
FIG. 5 illustrates a chaining mode according to a second preferred embodiment of the present invention, “the iterative variant”. The upper half of the figure illustrates encryption and the lower half of the figure illustrates decryption.
The first plaintext block, “Plaintext Block 1”, has to be treated in a special manner, as there is no preceding plaintext block. To this end, just as in the prior art, the method in FIGS. 5 and 6 uses a preferably random initialization key K and a preferably random initialization vector IV that are already known. The IV can be sent in non-protected form while the key has to be securely transmitted to a receiver of the encrypted content. The person skilled in the art will appreciate that key K may for example be transmitted to the receiver encrypted with a receiver's device key. This encryption step may be performed using public key cryptography or symmetric key cryptography. If it is done with symmetric key, then this invention may also be used for encryption of the initialization key K.
Plaintext block 1 is encrypted using an encryption key that results from the initialization key K XORed with a random IV, so as to generate ciphertext block 1. Each subsequent plaintext block is encrypted using a new encryption key that is obtained by XOR-ing the previous plaintext block and the key used to encrypt the previous plaintext block. The obtained ciphertext blocks may be transmitted one by one as soon as they are encrypted, but it is also possible to group two or more (up to all) ciphertext blocks for transmission.
Ciphertext block 1 is decrypted using a decryption key that results from the XOR between initialization key K and the IV, so as to generate plaintext block 1. Each subsequent ciphertext block is decrypted using a new decryption key that is obtained by XOR-ing the previous generated plaintext block and the key used to decrypt the previous ciphertext block.
The skilled person will appreciate that the encryption key and the decryption key are advantageously identical.
The iterative and non-iterative variant can be implemented in different ways. For example, any block cipher algorithm can be used for encryption and decryption; the preferred algorithm is AES. Another example is to use another function than XOR to combine the key and the plaintext block, such as addition modulo 2 x, where x is the bit length of the key K. It is also possible to modify the plaintext block, for example by application of a one-way function, before it is combined with the key.
Also, the present invention can be combined with any other block chaining mode operation like CBC. If combined with CBC mode, the present invention provides an interesting alternative to Modified Propagating Cipher Block Chaining Mode (MPCBC). The combination of the second preferred embodiment of the method and the CBC is illustrated in FIG. 6. As can be seen, an added feature compared to FIG. 5 is that a plaintext block is combined (by XOR) with the previous ciphertext block before encryption.
In the following is described a particular mechanism that can make the proposed chaining mode even more efficient and more secure. The mechanism works for the two embodiments of the method of generating the encryption/decryption key, iterative and non-iterative. The description is given here for the iterative embodiment as it is more complex than the non-iterative embodiment.
Encryption of data is generally done in “rounds” within block cipher algorithms. Each round uses a round key or a subkey to process the data. The setup of each round is the same, except for the subkey that is changed, i.e. the data is iteratively encrypted in each round. Therefore, most of the block ciphers include a key schedule algorithm that calculates the subkeys from a master key K. More precisely, a key schedule algorithm processes the key K and a direction (“encrypt” or “decrypt”) and produces a sequence of R subkeys EK0, EK1, . . . , EKR−1, if the direction is encrypt or DK0, DK1, . . . , DKR−1, if the direction is decrypt. Encryption is performed through the R round as depicted in FIG. 7. Some block ciphers like Tiny Encryption Algorithm (TEA) have simple key schedules where a 128-bit master key K is split into four 32-bit round keys and used repeatedly in successive rounds. Other block ciphers use more complicated key schedules; this is the case for AES, which expands a key K into several rounds keys that has same length as master key K.
When encrypting several blocks with the same key K, the key schedule algorithm is generally called once at the beginning, before encryption of the first plaintext block. Encryption of successive plaintext blocks is done using previously computed subkeys. This is how it is done in prior art methods like CBC or PCBC. In this invention, given that the key changes for the encryption of each block, the key schedule algorithm has to be executed several times; as many as the total number of plaintext blocks. This introduces a delay on the performance and slows down encryption/decryption speed, something that may be unwanted.
It would thus be advantageous to have a variant embodiment of the method that avoids this drawback. Instead of combining the key, we combine at least one subkey with a preceding plaintext block. For instance, the XOR operation is done between at least one subkey used to encrypt/decrypt a preceding block with the preceding plaintext block itself.
FIG. 8 illustrates the variant embodiment of the method according to the invention using AES. The 128-bit version of AES expands a 128-bit key K into ten 128-bit subkeys EK0, EK1, EK9 through the key schedule algorithm when the direction is encrypt. Plaintext block 1 is iteratively encrypted using 10 subkeys, were the first subkey results from a XOR between EK0 and the IV and all other subkeys EKi where i≠0 remain identical to the subkeys originally generated by the key schedule. Each subsequent plaintext block N is iteratively encrypted using new encryption subkeys that are obtained by taking the previous subkeys (used to encrypt the previous plaintext block) and XOR-ing the previous plaintext block N-1 with the subkey EKn where n is the remainder of the division of N-1 by 10 (i.e. n=N-1%10). All other subkeys EKi where i≠n remain identical to subkeys EKi encrypting previous plaintext block. For example, FIG. 8 shows how the initial subkeys EK0 to EK9 are modified for each plaintext block; only EK0 is modified for plaintext block 1, and only EK1 is further modified for plaintext block 2 and so on.
During decryption, the key K is expanded through the key schedule algorithm into ten 128-bit subkeys DK0, DK1, . . . , DK9. Ciphertext block 1 is iteratively decrypted using the 10 subkeys, where the first subkey results from a XOR between DK0 and the IV and all other subkeys DKi with i≠0 are identical to subkeys generated by the key schedule to generate plaintext block 1. Each subsequent ciphertext block N is iteratively decrypted using new decryption subkeys that are obtained by taking the previous subkeys (used to decrypt the previous ciphertext block) and XOR-ing the previous plaintext block N-1 with the subkey DKn where n is the remainder of the division of N-1 by 10 (i.e. n=N-1%10). All other subkeys DKi where i≠n remain identical to subkeys DKi decrypting previous ciphertext block.
Given that the decryption process can only be done in a predefined order (first ciphertext block 1 then ciphertext block 2, etc), the decryption device is able to know which subkey it should combine with the previous plaintext block for the decryption of a given ciphertext block. A counter/variable may be used to point to the right subkey after each block decryption operation.
Modifying only one subkey by XOR-ing it with previous plaintext at each block encryption enables having no more operations than classical chaining modes (there is only one XOR operation added at each block encryption). It will thus be appreciated that this variant embodiment is as efficient as prior art chaining modes.
The method can be generalized to a block cipher that expands the key K to any number of subkeys. If the total number of subkeys is R then each block N is encrypted/decrypted using new subkeys that are obtained by taking the previous subkeys (used to encrypt/decrypt the previous block) and XOR-ing the previous plaintext block N-1 with the subkey EKn/DKn where n is the remain of the division of N-1 by R (i.e. n=N-1% R).
In another variant, the encryption/decryption subkeys are generated by XOR-ing all previous subkeys used to encrypt/decrypt the previous ciphertext block with previous plaintext block N-1. For the first plaintext/ciphertext block the encryption/decryption subkeys are all XOR-ed with the initialization vector IV.
In another variant, the encryption/decryption subkeys are generated by XOR-ing always the same subkey, say EK0/DK0, with previous plaintext block N-1 and for the first block EK0/DK0 is XOR-ed with the IV.
In a further variant, the encryption/decryption subkeys are generated, using any combination of at least two previous subkeys (EKi, EKj)/(DKi, DKj) (used to encrypt/decrypt the previous ciphertext block) together with previous plaintext block. The combination operation may use, but is not restricted to, any one-way function.
From security point of view, some block cipher algorithms suffer from related-key attacks due to a weakness in their key schedule. This is the case for Tiny Encryption Algorithm (TEA) that was designed to minimize memory footprint, and maximize speed. TEA weaknesses arise from the overly simple design of its key schedule algorithm.
To prevent related-key attack on block ciphers, a strong key schedule is preferred. It should have the following properties:
    • Property 1: Given any subkey it should be infeasible to get back to the other subkeys or to the master key K just by inverting the functions used. Property 2: It should eliminate bit leakage between subkeys and master key K.
The second property ensures that for example subkey EKi and subkey EKi−1 or subkey EKi+1 do not have a lot of bit information in common. As some attacks make use of the relations between subkeys, these would have a higher complexity if these relations did not exist.
Using the method according to the present invention, the key schedule output would not depend only the key K but also on the plaintext to encrypt. This makes a key schedule more difficult to invert if the plaintext is not known. This is what is expected by Property 1. In other words, mixing a vulnerable key schedule output with some plaintext blocks makes the key schedule less vulnerable.
Furthermore, changing the subkey that is modified at each block encryption enables Property 2. Indeed, If the key schedule is vulnerable and produces for the encryption of block N two subkeys EKn−1 and EKn that have a lot of bit information in common then the couple (EKn−1 XOR Pn−1 and EKn XOR Pn) would have less information in common, as the two plaintext blocks Pn−1 and Pn are likely to be different. This is what it is done when subkeys EKn/DKn are modified at each block encryption/decryption (where n=N-1% R and R is number of rounds in the block cipher algorithm). This way, common information between two subkeys and even between a subkey and the master key K is eliminated.
Besides, to set up an attack in practice often requires a huge number of ciphertexts, for which plaintexts are different but encrypted with the same key. With prior art methods, when encrypting long messages, these are split in different blocks and encrypted with the same key. This may then help when gathering the amount of needed ciphertexts to carry-out the attack. The method according to the present invention makes this much more difficult, as the key changes for the encryption of each block for long messages.
FIG. 9 further illustrates the general encryption method according to a preferred embodiment of the invention. In FIG. 9, a single plaintext block is encrypted, but it will be appreciated that it is possible to generalise the method by iteration. First, plaintext block N is retrieved 910 and encryption key N is generated 920 using plaintext block N-1 and encryption key N-1. In a preferred embodiment, plaintext block N-1 and encryption key N-1 are combined using XOR. It will be appreciated that step 910 may just as well occur after step 920. Then, plaintext block N is encrypted 930 using an encryption algorithm and encryption key N, which obtains 940 ciphertext block N that may then be transmitted or stored. As mentioned, the method may then be iterated with N increased by one.
FIG. 10 further illustrates the decryption method according to a preferred embodiment of the invention. In FIG. 10, a single ciphertext block is decrypted, but it will be appreciated that it is possible to generalise the method by iteration. First, ciphertext block N is retrieved 1010 and decryption key N is generated 1020 using plaintext block N-1 and decryption key N-1. In a preferred embodiment, plaintext block N-1 and decryption key N-1 are combined using XOR. It will be appreciated that step 1010 may just as well occur after step 1020. Then, ciphertext block N is decrypted 1030 using a decryption algorithm and decryption key N, which obtains 1040 plaintext block N. As mentioned, the method may then be iterated with N increased by one.
As mentioned for the encryption method hereinbefore, the first block is decrypted using an initialization key that may be previously known by the decryption unit or received thereby before decryption begins.
FIG. 11 illustrates an encryption system according to a preferred embodiment of the invention. The encryption system 1100 comprises an encryption device 1110 and a decryption device 1120. The encryption device 1110 is adapted to receive plaintext, encrypt the received plaintext, and output the obtained ciphertext. Analogously, the decryption device 1120 is adapted to receive ciphertext, decrypt the received ciphertext, and output the obtained plaintext.
In more detail, the encryption device 1110 comprises at least one communication unit “I/O” 1116 adapted to receive plaintext and output ciphertext, and preferably at least one memory 1114 advantageously adapted to store plaintext, intermediary results, ciphertext and at least one encryption key. Device 1110 further comprises a protected area 1118 adapted to store one or several device secret keys. Device secret keys are used to encrypt the initialization key K before transmission. The choice of the device keys to be used by encryption device 1110 depends on the receiver of the encrypted data. The protected area 1118 is preferably resistant against software altering and physical tampering. The protected area 1118 is not necessary if initialization key K is encrypted using asymmetric cryptography, as encryption device 1110 will use public keys for the encryption. Further, the encryption device 1110 comprises a processor 1112 adapted to perform encryption of plaintext according to any of the embodiments of the method described herein.
Similarly, in more detail, the decryption device 1120 comprises at least one communication unit “I/O” 1126 adapted to receive ciphertext and output plaintext, and preferably at least one memory 1124 advantageously adapted to store plaintext, intermediary results, ciphertext and at least one decryption key. Device 1120 further comprises a protected area 1128 adapted to store a device secret key. The device secret key was previously used by encryption device 1110 to encrypt the initialization key K before being transmitted to the decryption device 1120. The protected area 1128 is preferably resistant against software altering and physical tampering. It is preferable to use the protected area 1128, because even if initialization key K is encrypted using asymmetric cryptography, decryption device 1120 will use a private key for the decryption of K and this private key needs to be protected and stored in a secure area. Further, the decryption device 1120 comprises a processor 1122 adapted to perform decryption of plaintext according to any of the embodiments of the method described herein.
Also illustrated are data storage mediums 1130, 1140 respectively storing thereon computer readable instructions that, when executed in a processor, perform the encryption method or decryption method according to any of the embodiments of the method described herein.
As will be appreciated, the present invention provides a more secure alternative to Modified Plain & Cipher Block Chaining Mode (MPCBC) while, at least in a variant embodiment, being as efficient.
Each feature disclosed in the description and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination. Features described as being implemented in hardware may also be implemented in software, and vice versa.
Reference signs appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.

Claims (10)

1. A method of generating a key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of plaintext blocks, the method comprising the steps of:
generating, by a device, a second encryption key for the present plaintext block by combining a previous plaintext block with a first generated encryption key, wherein the first generated encryption key was used as an encryption key for encryption of the previous plaintext block and generated by combining a plaintext block immediately preceding the previous plaintext block and a third encryption key, the previous plaintext block immediately preceding the present plaintext block in the ordered series.
2. The method of claim 1, wherein the first encryption key is an initialization encryption key.
3. A method of encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of plaintext blocks, the method comprising the steps of:
generating, at an encryption device, a second encryption key for the present plaintext block by combining a previous plaintext block with a first generated encryption key, wherein the first generated encryption key was used as an encryption key for encryption of the previous plaintext block and generated by combining a plaintext block immediately preceding the previous plaintext block and a third encryption key, the previous plaintext block immediately preceding the present plaintext block in the ordered series; and
encrypting, at the encryption device, the present plaintext block using an encryption algorithm with the generated second encryption key.
4. A method of generating a key for decrypting a present ciphertext block of digital data, the present ciphertext block belong to an ordered series of ciphertext blocks, the method comprising the steps of:
generating, by a device, a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first generated decryption key, wherein the first generated decryption key was used as a decryption key to obtain the previously obtained plaintext block and generated by combining a plaintext block decrypted immediately prior to the previous plaintext block and a third encryption key, the previously obtained plaintext block corresponding to the ciphertext block that immediately precedes the present ciphertext block in the ordered series.
5. The method of claim 4, wherein, in the second decryption key generation step, a one-way function is applied to the previously obtained plaintext block before the combination.
6. The method of claim 4, wherein the first generated decryption key is:
a subkey of either:
a plurality of subkeys resulting from a key schedule algorithm; or
a plurality of subkeys used for decryption of the previously obtained plaintext block.
7. A method of decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of ciphertext blocks, the method comprising the steps of:
generating, at a decryption device, a decryption key by combining a previously obtained plaintext block with a first generated decryption key, wherein the first generated decryption key was used as a decryption key to obtain the previously obtained plaintext block and generated by combining a plaintext block decrypted immediately prior to the previous plaintext block and a third encryption key, the previously obtained plaintext block corresponding to the ciphertext block that immediately precedes the present ciphertext block in the ordered series; and
decrypting, at a decryption device, the present ciphertext block using a decryption algorithm with the generated decryption key.
8. A device for generating an encryption key for encrypting a present plaintext block of digital data, the present plaintext block belonging to an ordered series of plaintext blocks, the device comprising:
a processor configured to:
generate a second encryption key for the present plaintext block by combining a previous plaintext block with a first generated encryption key, wherein the first generated encryption was used as an encryption key for encryption of the previous plaintext block and generated by combining a plaintext block immediately preceding the previous plaintext block and a third encryption key, the previous plaintext block immediately preceding the present plaintext block in the ordered series.
9. A device for generating a decryption key for decrypting a present ciphertext block of digital data, the present ciphertext block belonging to an ordered series of ciphertext blocks, the device comprising,
a processor configured to:
generate a second decryption key for the present ciphertext block by combining a previously obtained plaintext block with a first generated decryption key, wherein the first generated decryption key was used as a decryption key to obtain the previously obtained plaintext block and generated by combining a plaintext block decrypted immediately prior to the previous plaintext block and a third encryption key, the previously obtained plaintext block corresponding to the ciphertext block that immediately precedes the present ciphertext block in the ordered series.
10. The device of claim 9, wherein a plurality of subkeys are used to decrypt a ciphertext block and wherein the processor is configured to find which at least one subkey from the plurality of subkeys to combine with the previously obtained plaintext block.
US12/592,696 2008-12-15 2009-12-01 Methods and devices for a chained encryption mode Expired - Fee Related US8259934B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP08305947 2008-12-15
EP08305947A EP2197144A1 (en) 2008-12-15 2008-12-15 Methods and devices for a chained encryption mode
EP08305947.7 2008-12-15

Publications (2)

Publication Number Publication Date
US20100150344A1 US20100150344A1 (en) 2010-06-17
US8259934B2 true US8259934B2 (en) 2012-09-04

Family

ID=40714270

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/592,696 Expired - Fee Related US8259934B2 (en) 2008-12-15 2009-12-01 Methods and devices for a chained encryption mode

Country Status (5)

Country Link
US (1) US8259934B2 (en)
EP (2) EP2197144A1 (en)
JP (1) JP2010140026A (en)
KR (1) KR20100069610A (en)
CN (1) CN101753292B (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130290792A1 (en) * 2012-04-30 2013-10-31 Michael J. Torla Cryptographic processing with random number generator checking
US8751789B2 (en) 2010-09-17 2014-06-10 International Business Machines Corporation General purpose distributed encrypted file system
US9679161B2 (en) 2013-04-25 2017-06-13 Globalfoundries Inc. Distribution of encrypted information in multiple locations
US9825931B2 (en) 2016-01-26 2017-11-21 Bank Of America Corporation System for tracking and validation of an entity in a process data network
US9853813B2 (en) 2016-03-17 2017-12-26 Crater Dog Technologies, LLC Method for securing a private key
US9979718B2 (en) 2016-05-11 2018-05-22 Bank Of America Corporation System for managing security and access to resource sub-components
US10026118B2 (en) 2016-02-22 2018-07-17 Bank Of America Corporation System for allowing external validation of data in a process data network
US10069672B2 (en) 2016-10-07 2018-09-04 Bank Of America Corporation Real time event capture, analysis and reporting system
US10067994B2 (en) 2016-10-07 2018-09-04 Bank Of America Corporation Real time event capture and transformation of transient data for an information network
US10116667B2 (en) 2016-01-26 2018-10-30 Bank Of America Corporation System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data network
US10129238B2 (en) 2016-02-10 2018-11-13 Bank Of America Corporation System for control of secure access and communication with different process data networks with separate security features
US10135870B2 (en) 2016-02-22 2018-11-20 Bank Of America Corporation System for external validation of secure process transactions
US10142347B2 (en) 2016-02-10 2018-11-27 Bank Of America Corporation System for centralized control of secure access to process data network
US10140470B2 (en) 2016-02-22 2018-11-27 Bank Of America Corporation System for external validation of distributed resource status
US10142312B2 (en) 2016-02-22 2018-11-27 Bank Of America Corporation System for establishing secure access for users in a process data network
US10158737B2 (en) 2016-10-07 2018-12-18 Bank Of America Corporation Real time event capture and analysis of transient data for an information network
US10157078B2 (en) 2016-04-10 2018-12-18 Bank Of America Corporation System for transforming large scale electronic processing using application block chain
US10178105B2 (en) 2016-02-22 2019-01-08 Bank Of America Corporation System for providing levels of security access to a process data network
US10318938B2 (en) 2016-02-22 2019-06-11 Bank Of America Corporation System for routing of process authorization and settlement to a user in process data network based on specified parameters
US10360820B2 (en) 2016-09-04 2019-07-23 Shahriar Pourazin Instrumentation privacy apparatus and method
US10387878B2 (en) 2016-02-22 2019-08-20 Bank Of America Corporation System for tracking transfer of resources in a process data network
US10402796B2 (en) 2016-08-29 2019-09-03 Bank Of America Corporation Application life-cycle transition record recreation system
US10438209B2 (en) 2016-02-10 2019-10-08 Bank Of America Corporation System for secure routing of data to various networks from a process data network
US10440101B2 (en) 2016-02-22 2019-10-08 Bank Of America Corporation System for external validation of private-to-public transition protocols
US10475030B2 (en) 2016-02-22 2019-11-12 Bank Of America Corporation System for implementing a distributed ledger across multiple network nodes
US10496989B2 (en) 2016-02-22 2019-12-03 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
US10607285B2 (en) 2016-02-22 2020-03-31 Bank Of America Corporation System for managing serializability of resource transfers in a process data network
US10636033B2 (en) 2016-02-22 2020-04-28 Bank Of America Corporation System for routing of process authorizations and settlement to a user in a process data network
US10679215B2 (en) 2016-02-22 2020-06-09 Bank Of America Corporation System for control of device identity and usage in a process data network
US10762504B2 (en) 2016-02-22 2020-09-01 Bank Of America Corporation System for external secure access to process data network
US10929545B2 (en) 2018-07-31 2021-02-23 Bank Of America Corporation System for providing access to data stored in a distributed trust computing network
US11218296B2 (en) 2019-02-09 2022-01-04 Druva Inc. Data de-duplication among untrusted entities
US11354285B2 (en) * 2020-04-15 2022-06-07 salesforee.com, inc. Bulk duplication detection supporting data encryption
US20220182217A1 (en) * 2020-12-07 2022-06-09 International Business Machines Corporation Implementing resilient deterministic encryption
US11374935B2 (en) 2016-02-11 2022-06-28 Bank Of America Corporation Block chain alias person-to-person resource allocation
US11631077B2 (en) 2017-01-17 2023-04-18 HashLynx Inc. System for facilitating secure electronic communications between entities and processing resource transfers

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650408B2 (en) 2010-09-08 2014-02-11 Xilinx, Inc. Protecting against differential power analysis attacks on decryption keys
US8832462B2 (en) * 2010-09-08 2014-09-09 Xilinx, Inc. Protecting against differential power analysis attacks on sensitive data
JP5672037B2 (en) * 2011-02-10 2015-02-18 大日本印刷株式会社 Encryption method, decryption method, encryption device, decryption device, and encryption / decryption system
EP2487828A1 (en) 2011-02-10 2012-08-15 Thomson Licensing Method and device for generating control words
CN102136906A (en) * 2011-04-29 2011-07-27 贵阳高新华美龙技术有限公司 Encryption algorithm for rapidly generating anti-counterfeiting code
CN102594548B (en) * 2012-03-22 2015-06-10 山东泰信电子股份有限公司 Method capable of achieving data sectional encryption and decryption
CN102546151A (en) * 2012-03-22 2012-07-04 山东泰信电子有限公司 Data encryption and decryption method
CN102594549B (en) * 2012-03-22 2015-02-11 山东泰信电子股份有限公司 Multistage data encryption and decryption methods
JP5875441B2 (en) 2012-03-29 2016-03-02 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Apparatus and method for encrypting data
CN103427987B (en) * 2012-05-25 2016-05-18 纬创资通股份有限公司 Method, data verification method and the electronic installation of data encryption
US9425959B1 (en) * 2012-10-03 2016-08-23 Altera Corporation Security variable scrambling
EP2717511A1 (en) * 2012-10-05 2014-04-09 Nagravision S.A. Method and device for digital data blocks encryption and decryption
US9735955B2 (en) * 2013-07-12 2017-08-15 The Board Of Regents Of The University Of Oklahoma Optical cryptography systems and methods
US9160525B2 (en) * 2013-07-19 2015-10-13 Qualcomm Incorporated Apparatus and method for key update for use in a block cipher algorithm
CN103593624A (en) * 2013-11-26 2014-02-19 中国汽车工业国际合作有限公司 Exhibition service platform encryption method
CN104683093B (en) * 2013-11-27 2018-01-26 财团法人资讯工业策进会 Have block encryption device, block encryption method, block decryption device and the block decryption method of integrity verification concurrently
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
US10298555B2 (en) 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
US9363247B2 (en) * 2014-04-04 2016-06-07 Zettaset, Inc. Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
US10608815B2 (en) 2014-07-28 2020-03-31 The Boeing Company Content encryption and decryption using a custom key
CN104579646B (en) * 2015-01-30 2015-12-30 南京法威克信息科技有限公司 Method, device and circuit that the limited monotonic transformation of clobber book and encryption and decryption thereof are applied
CN104602209A (en) * 2015-02-27 2015-05-06 中国科学院大学 Combined information source short message encryption and decryption method based on RSA algorithm and stream cipher algorithm
CN104901811B (en) * 2015-06-12 2018-11-16 信和汇诚信用管理(北京)有限公司 A kind of symmetric cryptography table and symmetric cipher
US10122690B2 (en) * 2015-07-13 2018-11-06 The Boeing Company Data encryption and authentication using a mixing function in a communication system
GB201519612D0 (en) * 2015-11-06 2015-12-23 Nagravision Sa Key sequence generation for cryptographic operations
KR101815175B1 (en) * 2016-05-27 2018-01-04 삼성에스디에스 주식회사 Apparatus and method for data encryption, apparatus and method for data decryption
CN107659397B (en) * 2017-08-11 2020-09-25 深圳市钱海网络技术有限公司 Sensitive information transmission method and system
US10965456B2 (en) 2017-09-25 2021-03-30 The Boeing Company Systems and methods for facilitating data encryption and decryption and erasing of associated information
US10924263B2 (en) * 2017-09-25 2021-02-16 The Boeing Company Systems and methods for facilitating iterative key generation and data encryption and decryption
US10860403B2 (en) 2017-09-25 2020-12-08 The Boeing Company Systems and methods for facilitating truly random bit generation
CN108616351B (en) * 2018-03-26 2020-09-18 山东大学 Full-dynamic encryption and decryption method and encryption and decryption device
WO2020036650A2 (en) * 2018-04-25 2020-02-20 The Regents Of The University Of California Compact key encoding of data for public exposure such as cloud storage
CN110061840B (en) * 2019-03-12 2022-10-28 平安科技(深圳)有限公司 Data encryption method and device, computer equipment and storage medium
CN110611568B (en) * 2019-09-20 2022-10-28 天翼电子商务有限公司 Dynamic encryption and decryption method, device and equipment based on multiple encryption and decryption algorithms
CN111654511A (en) * 2020-07-13 2020-09-11 中国银行股份有限公司 Chained data encryption method, chained data decryption method and corresponding systems
CN112866288B (en) * 2021-03-01 2022-09-06 上海海事大学 Data symmetric encryption method for double-plaintext transmission
CN113347001B (en) * 2021-05-31 2023-04-28 广州众诺电子技术有限公司 Data protection method, server, system, equipment and medium
CN113378200B (en) * 2021-06-28 2022-02-22 江苏翔晟信息技术股份有限公司 Electronic contract file grouping encryption system and method based on separated storage
CN114301718A (en) * 2022-03-10 2022-04-08 北京微芯感知科技有限公司 File transmission method for chain encryption by adopting single key

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030056118A1 (en) * 2001-09-04 2003-03-20 Vidius Inc. Method for encryption in an un-trusted environment
WO2007118829A1 (en) 2006-04-18 2007-10-25 International Business Machines Corporation Encryption apparatus and method for providing an encrypted file system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006279406A (en) * 2005-03-29 2006-10-12 Hitachi Information Technology Co Ltd Encrypting and decrypting method, and apparatus threefor
CN1323507C (en) * 2005-06-28 2007-06-27 华为技术有限公司 Short block processing method in block encryption algorithm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030056118A1 (en) * 2001-09-04 2003-03-20 Vidius Inc. Method for encryption in an un-trusted environment
WO2007118829A1 (en) 2006-04-18 2007-10-25 International Business Machines Corporation Encryption apparatus and method for providing an encrypted file system
US20070253549A1 (en) * 2006-04-18 2007-11-01 Ufuk Celikkan Encryption apparatus and method for providing an encrypted file system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Bruce Schneier: "Applied cryptography Second Edition" 1996, John Wiley & Sons, Inc. USA p. 193-p. 196, p. 200-p. 2009.
Search Report dated Jun. 17, 2009.

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8751789B2 (en) 2010-09-17 2014-06-10 International Business Machines Corporation General purpose distributed encrypted file system
US8788806B2 (en) 2010-09-17 2014-07-22 International Business Machines Corporation General purpose distributed encrypted file system
US9158499B2 (en) * 2012-04-30 2015-10-13 Freescale Semiconductor, Inc Cryptographic processing with random number generator checking
US20130290792A1 (en) * 2012-04-30 2013-10-31 Michael J. Torla Cryptographic processing with random number generator checking
US9679161B2 (en) 2013-04-25 2017-06-13 Globalfoundries Inc. Distribution of encrypted information in multiple locations
US10116667B2 (en) 2016-01-26 2018-10-30 Bank Of America Corporation System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data network
US9825931B2 (en) 2016-01-26 2017-11-21 Bank Of America Corporation System for tracking and validation of an entity in a process data network
US10438209B2 (en) 2016-02-10 2019-10-08 Bank Of America Corporation System for secure routing of data to various networks from a process data network
US10142347B2 (en) 2016-02-10 2018-11-27 Bank Of America Corporation System for centralized control of secure access to process data network
US10129238B2 (en) 2016-02-10 2018-11-13 Bank Of America Corporation System for control of secure access and communication with different process data networks with separate security features
US11374935B2 (en) 2016-02-11 2022-06-28 Bank Of America Corporation Block chain alias person-to-person resource allocation
US10614461B2 (en) 2016-02-22 2020-04-07 Bank Of America Corporation System for implementing a distributed ledger across multiple network nodes
US10762504B2 (en) 2016-02-22 2020-09-01 Bank Of America Corporation System for external secure access to process data network
US10135870B2 (en) 2016-02-22 2018-11-20 Bank Of America Corporation System for external validation of secure process transactions
US11102279B2 (en) 2016-02-22 2021-08-24 Bank Of America Corporation System for external validation of private-to-public transition protocols
US10140470B2 (en) 2016-02-22 2018-11-27 Bank Of America Corporation System for external validation of distributed resource status
US10142312B2 (en) 2016-02-22 2018-11-27 Bank Of America Corporation System for establishing secure access for users in a process data network
US11030621B2 (en) 2016-02-22 2021-06-08 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
US10679215B2 (en) 2016-02-22 2020-06-09 Bank Of America Corporation System for control of device identity and usage in a process data network
US10636033B2 (en) 2016-02-22 2020-04-28 Bank Of America Corporation System for routing of process authorizations and settlement to a user in a process data network
US10178105B2 (en) 2016-02-22 2019-01-08 Bank Of America Corporation System for providing levels of security access to a process data network
US10318938B2 (en) 2016-02-22 2019-06-11 Bank Of America Corporation System for routing of process authorization and settlement to a user in process data network based on specified parameters
US10607285B2 (en) 2016-02-22 2020-03-31 Bank Of America Corporation System for managing serializability of resource transfers in a process data network
US10387878B2 (en) 2016-02-22 2019-08-20 Bank Of America Corporation System for tracking transfer of resources in a process data network
US10496989B2 (en) 2016-02-22 2019-12-03 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
US10026118B2 (en) 2016-02-22 2018-07-17 Bank Of America Corporation System for allowing external validation of data in a process data network
US10475030B2 (en) 2016-02-22 2019-11-12 Bank Of America Corporation System for implementing a distributed ledger across multiple network nodes
US10440101B2 (en) 2016-02-22 2019-10-08 Bank Of America Corporation System for external validation of private-to-public transition protocols
US10439811B2 (en) 2016-03-17 2019-10-08 Crater Dog Technologies, LLC Method for securing a private key on a mobile device
US9853813B2 (en) 2016-03-17 2017-12-26 Crater Dog Technologies, LLC Method for securing a private key
US10437630B2 (en) 2016-04-10 2019-10-08 Bank Of America Corporation System for transforming large scale electronic processing using application block chain and multi-structured data stores
US10157078B2 (en) 2016-04-10 2018-12-18 Bank Of America Corporation System for transforming large scale electronic processing using application block chain
US9979718B2 (en) 2016-05-11 2018-05-22 Bank Of America Corporation System for managing security and access to resource sub-components
US10402796B2 (en) 2016-08-29 2019-09-03 Bank Of America Corporation Application life-cycle transition record recreation system
US10360820B2 (en) 2016-09-04 2019-07-23 Shahriar Pourazin Instrumentation privacy apparatus and method
US10067994B2 (en) 2016-10-07 2018-09-04 Bank Of America Corporation Real time event capture and transformation of transient data for an information network
US10158737B2 (en) 2016-10-07 2018-12-18 Bank Of America Corporation Real time event capture and analysis of transient data for an information network
US10153939B2 (en) 2016-10-07 2018-12-11 Bank Of America Corporation Real time event capture, analysis and reporting system
US10069672B2 (en) 2016-10-07 2018-09-04 Bank Of America Corporation Real time event capture, analysis and reporting system
US10503750B2 (en) 2016-10-07 2019-12-10 Bank Of America Corporation Real time event capture and transformation of transient data for an information network
US11631077B2 (en) 2017-01-17 2023-04-18 HashLynx Inc. System for facilitating secure electronic communications between entities and processing resource transfers
US10929545B2 (en) 2018-07-31 2021-02-23 Bank Of America Corporation System for providing access to data stored in a distributed trust computing network
US11218296B2 (en) 2019-02-09 2022-01-04 Druva Inc. Data de-duplication among untrusted entities
US11354285B2 (en) * 2020-04-15 2022-06-07 salesforee.com, inc. Bulk duplication detection supporting data encryption
US20220182217A1 (en) * 2020-12-07 2022-06-09 International Business Machines Corporation Implementing resilient deterministic encryption
US11695541B2 (en) * 2020-12-07 2023-07-04 International Business Machines Corporation Implementing resilient deterministic encryption
US11930099B2 (en) 2020-12-07 2024-03-12 International Business Machines Corporation Implementing resilient deterministic encryption

Also Published As

Publication number Publication date
KR20100069610A (en) 2010-06-24
US20100150344A1 (en) 2010-06-17
EP2197144A1 (en) 2010-06-16
CN101753292A (en) 2010-06-23
CN101753292B (en) 2014-06-18
JP2010140026A (en) 2010-06-24
EP2197145A3 (en) 2012-08-01
EP2197145A2 (en) 2010-06-16

Similar Documents

Publication Publication Date Title
US8259934B2 (en) Methods and devices for a chained encryption mode
AU2008201156B2 (en) Precalculated Encryption Key
Agrawal et al. Implementation and analysis of various symmetric cryptosystems
EP1161811B1 (en) Method and apparatus for encrypting and decrypting data
Karthigaikumar et al. Simulation of image encryption using AES algorithm
JP7353375B2 (en) End-to-end double ratchet encryption with epoch key exchange
US8718280B2 (en) Securing keys of a cipher using properties of the cipher process
US20120314857A1 (en) Block encryption device, block decryption device, block encryption method, block decryption method and program
Reyad et al. Key-based enhancement of data encryption standard for text security
CN109714154B (en) Implementation method of white-box cryptographic algorithm under white-box security model with difficult code volume
US20170041133A1 (en) Encryption method, program, and system
Knudsen Dynamic encryption
Rawal Advanced encryption standard (AES) and it’s working
Kumar et al. Expansion of Round Key generations in Advanced Encryption Standard for secure communication
Kumar et al. Fundamentals of symmetric cryptography
US20230403134A1 (en) Method for processing encrypted data
US20230216659A1 (en) Method for processing encrypted data
Kadry et al. An improvement of RC4 cipher using vigenère cipher
KR20040083794A (en) encryption/decryption method of application data
JP5293612B2 (en) ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM
KR20110042419A (en) Mode of operation adapted to multimedia environments
Padhi et al. Modified version of XTS (XOR-Encrypt-XOR with Ciphertext Stealing) using tweakable enciphering scheme
Taha Text encryption using modified AES-2 keys
Sumanth Enhanced Security for Wireless Networks
CN114143022A (en) Data encryption method, data transmission method, data decryption method and related devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: THOMSON LICENSING,FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KARROUMI, MOHAMED;ONNO, STEPHANE;MONSIFROT, ANTOINE;SIGNING DATES FROM 20091116 TO 20091117;REEL/FRAME:023631/0401

Owner name: THOMSON LICENSING, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KARROUMI, MOHAMED;ONNO, STEPHANE;MONSIFROT, ANTOINE;SIGNING DATES FROM 20091116 TO 20091117;REEL/FRAME:023631/0401

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200904